Remove Computer and Electronics Remove Government Remove Privacy Remove Survey
article thumbnail

GDPR and The Data Governance Imperative

AIIM

This is the 12th post in a series on privacy by Andrew Pery. Data Privacy and Open Data: Secondary Uses under GDPR. Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. Privacy by Design: The Intersection of Law and Technology. GDPR and the Data Governance Imperative.

GDPR 92
article thumbnail

Could a Mobile App Help Contain COVID-19? Balancing Privacy Rights & Public Interest

AIIM

In one such approach, a multidisciplinary group of computer scientists, mathematicians, and epidemiologists at the Big Data Institute at Oxford University have developed a mathematical model instantiated in a mobile application that traces contact. National Electronic Health Records Database. Wide-Scale Testing. Big Data Analytics.

Privacy 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Calls for Legislative Action to Set Rules for Cloud Computing

Hunton Privacy

Microsoft is urging Congress and the information technology industry to act now to ensure that cloud computing is guided by an international commitment to privacy, security and transparency for consumers, businesses and government.

article thumbnail

Friday the 13th is Unlucky for the City of New Orleans. Almost. Maybe.: Cybersecurity Trends

eDiscovery Daily

In Friday’s post about Norton Rose Fulbright’s 2019 Litigation Trends Annual Survey , one of the most notable trends was that 44 percent of corporate respondents identified Cybersecurity/data privacy as the most likely new source of dispute for their business on the horizon, which was more than four times the next likely sources.

article thumbnail

Lawsuits Allege Apple Applications Sent Personal Information to Third Parties

Hunton Privacy

In addition to alleged violations of California law, the class actions claim that Apple and the application developers violated both the Computer Fraud and Abuse Act (by accessing the users’ iPhones or iPads without authorization), and the Electronic Communications Privacy Act (by willfully intercepting the users’ communications).

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Two: eDiscovery Best Practices

eDiscovery Daily

Because more than 90 percent of documents today are generated in electronic format, ESI is becoming more and more prominent in criminal matters, especially white collar criminal cases. This exception is generally allowed for protection of law enforcement officers and may not give them the right to seize a computer unless it poses a threat.

article thumbnail

AI, Records, and Accountability

ARMA International

For years, records management has been helping organizations address emerging legal and ethical challenges such as information privacy, compliance, and eDiscovery. It has expanded its scope, methods, and capabilities to encompass what is now called information governance. Definitions of AI. The report noted that approximately “.